Pattern unlock is one of the many device protection mechanisms available to Android users, and there are quite a lot of people out there who actually rely on said method to secure their devices from unauthorized access. The problem, however, arises in case you forget the pattern that you set to unlock the device. Worse yet, there could be a situation where your friend may have tried to play a prank on you by setting a pattern lock that you are completely unaware of. The question is, how does get out of such tricky situation without suffering any headaches? Seems like XDA member m.sabra has the answer – more than one, in fact. The dev has come up with a couple of very effective computer-based solutions in this regard that let you easily bypass/crack pattern unlock on any Android device. The only caveat in employing both said solutions is that they require ADB to be installed on your computer, and USB Debugging enabled on your device. Although both methods are known to be working with rooted, as well as non-rooted devices, employing them on a rooted device is likely to yield more fruitful results. Past the break, we’ll be taking a closer look at both solutions in detail.
First things first, and you must have good knowhow of installation and use of ADB. If you’re new to Android, then our detailed guide on ADB and all interrelated components could of ample assistance to you.
To toggle USB Debugging on Android 4.0 and higher, navigate to the Developer options on the general settings screen. On non-ICS devices, said option can be found by navigating to the Settings > Applications > Development screen.
Provided all prerequisites are in place, here’s what you need to do in order to nullify pattern unlock on your Android:
- Connect your device with the computer via USB cable
- Open Command Prompt and key in the exact code as displayed below:
adb shell cd /data/data/com.android.providers.settings/databases sqlite3 settings.db update system set value=0 where name='lock_pattern_autolock'; update system set value=0 where name='lockscreen.lockedoutpermanently'; .quit
- Reboot your device
- You may now unlock your device providing whatever pattern you like
If the above method doesn’t work, try using the following code instead:
adb shell rm /data/system/gesture.key
After rebooting, unlock your device using ay preferred pattern. As evident from the above, neither method disables the pattern unlock. Instead, they just nullify the pattern order on the lock screen.
Both methods have successfully been tested using a combination of HTC Desire Z (running CyanogenMod 7.2) and Windows 7 (64-bit Edition), and a good thing about these solutions is that they work independent of, as well as in tandem with, each other, so no harm in deploying them both simultaneously. Once you regain access in to the OS, head over to the system security settings, reselect your preferred unlock method, and you’re good to go.
Special Note: The purpose of this guide is to help users with employing an effective pattern unlock bypass solution only on their own devices, instead of using it for malicious (read: unethical) purposes. On the other hand, it begets the need to keep USB Debugging disabled on your device if and when not required in order to be on the safe side.